General

  • Target

    dControl.zip

  • Size

    447KB

  • MD5

    6e89f80314099d7a07dcdeab97688dd9

  • SHA1

    c34ccf55bbea1cd8ffb4c445bd048621fb99fe14

  • SHA256

    cc5cdee465521f923013901ef925190dfd166d1494bdc85c95e763c7f3603f57

  • SHA512

    4e71e2f9e06c71bc9b94e4f839b6ce540fcb50474ba5f4de5c3642c2d97ea6436db632ff2a1d54a9cb54bd87df1cd35ebda82d28281b43588ee6adb5f6860e48

  • SSDEEP

    12288:mzoljnMjhdmYkCRo2gfLc4Gn6YQ55IyAsvtJL/l:C+Mddk2gTc4GnkeSV

Score
5/10
upx

Malware Config

Signatures

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dControl.zip
    .zip

    Password: passwordd

  • dControl/Defender_Settings.vbs
    .vbs
  • dControl/ReadMe.txt
  • dControl/dControl.exe
    .exe windows:5 windows x86 arch:x86

    Password: passwordd


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • dControl/dControl.ini